Authentication Strategy for Information Resources of Asymmetric Information Sharing Network

Download Now
Provided by: Binary Information Press
Topic: Security
Format: PDF
In this paper, the authors tackle the security authentication issue existing in information aggregation process of the asymmetric information sharing network. A TUCL (Trusted Uniform Content Locator) based authentication model is proposed, which combines both the high-level and low-level semantics of information resources to preserve and enhance the integrity and reliability of information. A novel authentication strategy is put forward, which is characterized by separating authentication plane from data plane to secure authenticating information. To improve the efficiency of authenticating services, a novel TUCL vector search algorithm based on semantics hotness is proposed.
Download Now

Find By Topic